{"id":"https://openalex.org/W7081929230","doi":"https://doi.org/10.1109/access.2025.3609670","title":"Margin-based Supervised Contrastive Learning for Robust Malware Detection","display_name":"Margin-based Supervised Contrastive Learning for Robust Malware Detection","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W7081929230","doi":"https://doi.org/10.1109/access.2025.3609670"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3609670","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3609670","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3609670","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Yawar Abbas Abid","orcid":"https://orcid.org/0009-0001-7159-2715"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Yawar Abbas Abid","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Punjab, Pakistan"],"raw_orcid":"https://orcid.org/0009-0001-7159-2715","affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Punjab, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jinsong Wu","orcid":"https://orcid.org/0000-0003-4720-5946"},"institutions":[{"id":"https://openalex.org/I69737025","display_name":"University of Chile","ror":"https://ror.org/047gc3g35","country_code":"CL","type":"education","lineage":["https://openalex.org/I69737025"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Jinsong Wu","raw_affiliation_strings":["Department of Electrical Engineering, University of Chile, Santiago, Chile"],"raw_orcid":"https://orcid.org/0000-0003-4720-5946","affiliations":[{"raw_affiliation_string":"Department of Electrical Engineering, University of Chile, Santiago, Chile","institution_ids":["https://openalex.org/I69737025"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Said Jadid Abdulkadir","orcid":"https://orcid.org/0000-0003-0038-3702"},"institutions":[{"id":"https://openalex.org/I203899302","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07","country_code":"MY","type":"education","lineage":["https://openalex.org/I203899302"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Said Jadid Abdulkadir","raw_affiliation_strings":["Centre for Research in Data Science, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia"],"raw_orcid":"https://orcid.org/0000-0003-0038-3702","affiliations":[{"raw_affiliation_string":"Centre for Research in Data Science, Universiti Teknologi PETRONAS, Seri Iskandar, Malaysia","institution_ids":["https://openalex.org/I203899302"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Ayed Alwadain","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Ayed Alwadain","raw_affiliation_strings":["Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science Department, Community College, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Muhammad Waqas","orcid":"https://orcid.org/0000-0002-4659-783X"},"institutions":[{"id":"https://openalex.org/I201384688","display_name":"National University of Computer and Emerging Sciences","ror":"https://ror.org/003eyb898","country_code":"PK","type":"education","lineage":["https://openalex.org/I201384688"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Waqas","raw_affiliation_strings":["FAST School of Computing, National University of Computer and Emerging Science (FAST-NUCES), Karachi, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-4659-783X","affiliations":[{"raw_affiliation_string":"FAST School of Computing, National University of Computer and Emerging Science (FAST-NUCES), Karachi, Pakistan","institution_ids":["https://openalex.org/I201384688"]}]},{"author_position":"last","author":{"id":null,"display_name":"Muhammad Farhan","orcid":"https://orcid.org/0000-0002-3649-5717"},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Farhan","raw_affiliation_strings":["Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Punjab, Pakistan"],"raw_orcid":"https://orcid.org/0000-0002-3649-5717","affiliations":[{"raw_affiliation_string":"Department of Computer Science, COMSATS University Islamabad, Sahiwal Campus, Punjab, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.58608937,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"1"},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.44029998779296875,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12157","display_name":"Geochemistry and Geologic Mapping","score":0.44029998779296875,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13177","display_name":"Geological and Geophysical Studies","score":0.046799998730421066,"subfield":{"id":"https://openalex.org/subfields/1907","display_name":"Geology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13067","display_name":"Geological Modeling and Analysis","score":0.02930000051856041,"subfield":{"id":"https://openalex.org/subfields/1906","display_name":"Geochemistry and Petrology"},"field":{"id":"https://openalex.org/fields/19","display_name":"Earth and Planetary Sciences"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.6222000122070312},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.5903000235557556},{"id":"https://openalex.org/keywords/feature-selection","display_name":"Feature selection","score":0.5085999965667725},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5001000165939331},{"id":"https://openalex.org/keywords/supervised-learning","display_name":"Supervised learning","score":0.4903999865055084},{"id":"https://openalex.org/keywords/feature-learning","display_name":"Feature learning","score":0.41280001401901245},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.39309999346733093},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.3919000029563904},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.3677999973297119}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817799985408783},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.675000011920929},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.6222000122070312},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6049000024795532},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5903000235557556},{"id":"https://openalex.org/C148483581","wikidata":"https://www.wikidata.org/wiki/Q446488","display_name":"Feature selection","level":2,"score":0.5085999965667725},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5001000165939331},{"id":"https://openalex.org/C136389625","wikidata":"https://www.wikidata.org/wiki/Q334384","display_name":"Supervised learning","level":3,"score":0.4903999865055084},{"id":"https://openalex.org/C59404180","wikidata":"https://www.wikidata.org/wiki/Q17013334","display_name":"Feature learning","level":2,"score":0.41280001401901245},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.39309999346733093},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.3919000029563904},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3758000135421753},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.3677999973297119},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.3382999897003174},{"id":"https://openalex.org/C2776145971","wikidata":"https://www.wikidata.org/wiki/Q30673951","display_name":"Labeled data","level":2,"score":0.33809998631477356},{"id":"https://openalex.org/C103278499","wikidata":"https://www.wikidata.org/wiki/Q254465","display_name":"Similarity (geometry)","level":3,"score":0.32910001277923584},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.31929999589920044},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3176000118255615},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.3127000033855438},{"id":"https://openalex.org/C3073032","wikidata":"https://www.wikidata.org/wiki/Q15912075","display_name":"Information hiding","level":3,"score":0.30570000410079956},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C58973888","wikidata":"https://www.wikidata.org/wiki/Q1041418","display_name":"Semi-supervised learning","level":2,"score":0.3018999993801117},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.2978000044822693},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.27559998631477356},{"id":"https://openalex.org/C2778334786","wikidata":"https://www.wikidata.org/wiki/Q1586270","display_name":"Variation (astronomy)","level":2,"score":0.259799987077713},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.2565000057220459},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.2551000118255615}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3609670","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3609670","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5e5d9534f1e84220b7ac3c66ad5126d0","is_oa":true,"landing_page_url":"https://doaj.org/article/5e5d9534f1e84220b7ac3c66ad5126d0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 165082-165095 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3609670","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3609670","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1993949132","display_name":null,"funder_award_id":"FRGS/1/2022/ICT02/UTP/02/4","funder_id":"https://openalex.org/F4320323380","funder_display_name":"Universiti Teknologi Petronas"}],"funders":[{"id":"https://openalex.org/F4320323380","display_name":"Universiti Teknologi Petronas","ror":"https://ror.org/048g2sh07"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"The":[0],"growth":[1],"of":[2,174,182,227],"network":[3,11,141,234],"technologies":[4],"has":[5,15,30],"led":[6],"to":[7,39,61,142,170,187],"a":[8,46,58,72,115,134,158],"rise":[9],"in":[10,17,53,78,205,233],"traffic":[12],"diversity,":[13],"which":[14,49,199],"resulted":[16],"increased":[18],"complexity":[19],"within":[20,114],"each":[21],"class.":[22],"However,":[23],"distinguishing":[24],"between":[25,103,119],"malicious":[26],"and":[27,91,101,117,152,167,185,193,212,231],"benign":[28],"actions":[29],"become":[31,45],"more":[32],"challenging":[33],"as":[34,222],"the":[35,109,124,140,148,172,175,180,196,225],"two":[36,105],"have":[37,44],"started":[38],"overlap.":[40],"Consequently,":[41],"false":[42],"alarms":[43],"common":[47],"issue,":[48],"can":[50],"cause":[51],"problems":[52],"detection":[54,64,77,92],"models.":[55],"We":[56,156],"proposed":[57],"novel":[59],"approach":[60,74,83,211],"enhance":[62],"intrusion":[63],"based":[65],"on":[66],"supervised":[67,126,164],"contrastive":[68,127,165,203],"learning":[69,128,136,210],"that":[70,138,145,162],"combines":[71,163],"maximum-margin-based":[73],"for":[75,219],"malware":[76,220],"an":[79],"end-to-end":[80],"process.":[81],"This":[82,131,177,208],"differs":[84],"from":[85],"traditional":[86],"methods,":[87],"where":[88],"feature":[89],"selection":[90],"are":[93,216],"considered":[94],"separate":[95,153],"stages.":[96],"Our":[97],"model":[98],"guarantees":[99],"robustness":[100],"correlation":[102],"these":[104],"processes.":[106],"To":[107],"handle":[108],"challenges":[110],"posed":[111],"by":[112],"Variation":[113],"class":[116],"similarities":[118],"different":[120],"classes,":[121],"we":[122],"use":[123],"margin-based":[125],"(MbSCL)":[129],"technique.":[130],"technique":[132],"involves":[133],"two-stage":[135,209],"process":[137,178],"enables":[139],"learn":[143],"embeddings":[144],"bring":[146],"closer":[147],"similar":[149],"data":[150,229],"points":[151],"dissimilar":[154],"ones.":[155],"employ":[157],"specialized":[159],"loss":[160,166,169,204,213],"function":[161,214],"marginal":[168],"improve":[171,188],"accuracy":[173],"classification.":[176],"balances":[179],"effectiveness":[181],"embedding":[183],"separation":[184],"classification":[186],"overall":[189],"performance.":[190],"Mathematical":[191],"theorems":[192],"proofs":[194],"support":[195],"optimization":[197],"process,":[198],"provides":[200],"insights":[201],"into":[202],"similarity":[206],"learning.":[207],"design":[215],"particularly":[217],"useful":[218],"detection,":[221],"they":[223],"enable":[224],"identification":[226],"subtle":[228],"patterns":[230],"anomalies":[232],"traffic.":[235]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
